> Please show "postconf -n" output and non-comment lines from master.cf.
[whitespace modified for readability]
>postconf -n
alias_database =
alias_maps =
append_dot_mydomain = no
biff = no
body_checks = regexp:$config_directory/tables/body_checks
config_directory = /etc/postfix
content_filter =
On 4/24/2011 9:07 PM, ben thielsen wrote:
given two lines in header_checks, both work when testing with postmap, but only
one works when processing actual mail. it's my sense that it's related to the
fact that the non working header check has to do with mail submitted via
sendmail(1), but i c
given two lines in header_checks, both work when testing with postmap, but only
one works when processing actual mail. it's my sense that it's related to the
fact that the non working header check has to do with mail submitted via
sendmail(1), but i can't figure out what i'm doing wrong.
>cat
Dear Patrick,
I did a testing and i was able to successful in linking the message to
the original username that was used in authenticating the connection
for message delivery.
the key was to grep '9A2E240330CE2' from the header
33 Received: from laptop.localnet (unknown [122.161.212.115])
34
Hi,
This little script was developed which analyses output postqueue -p
and prints the report on the greatest abusers. It was developed
to quickly clear the queue of the deferred spam messages.
It is a stream processor and does not hogs memory , can analyze really
large volumes from postqueue -p.
Dear Patrixk,
I express my gratitude to this list . I am grateful for the people
in the list who contribute their gems. I am new to postfix (qmail migrant) ,
but with a lively list like this i am feeling home.
the postcat is very handy to print the headers and contents
i am sure i should be able
Am 24.04.2011 23:42, schrieb fakessh:
> Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
>> smtpd_helo_required = yes
>
> I follow the advice given to me I just added this option
>
> smtpd_helo_required = yes
you sould not only ADD this option because it makes nothing better
since yo
Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
> smtpd_helo_required = yes
I follow the advice given to me I just added this option
smtpd_helo_required = yes
--
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x092164A7
gpg --keyserver pgp.mit.edu --recv-key 092164A7
pgpOhsGX6
i reread the doc
i just changed this option
smtpd_tls_security_level = may
Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
> what have "smtp_tls_note_starttls_offer" to do with EHLO/HELO
> and what have smtp_*-commands to do with receive?
>
> why you are using so complex EHLO-restricti
what have "smtp_tls_note_starttls_offer" to do with EHLO/HELO
and what have smtp_*-commands to do with receive?
why you are using so complex EHLO-restrictions?
the following should be enough!
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks
reject_non_fqdn_helo_hostname
re
Le dimanche 24 avril 2011 22:37, fakessh a écrit :
> I just changed this option
>
> smtp_tls_note_starttls_offer = may
>
> that it's OK or not OK
>
> thanks
i just reread the doc and
I think he must use
smtpd_tls_security_level = may
it's OK wieste ?
thanks ...
s ///
>
> Le dimanche 24 avri
I just changed this option
smtp_tls_note_starttls_offer = may
that it's OK or not OK
thanks
Le dimanche 24 avril 2011 22:10, fakessh a écrit :
> hello postfix guru
> hello Wieste and other develloper
>
>
> I already post a question asking for more.
>
> how to allow both HELO and EHLO. I curre
hello postfix guru
hello Wieste and other develloper
I already post a question asking for more.
how to allow both HELO and EHLO. I currently only accept EHLO and I see that I
refuse a lot of legitimate mail
my postconf -n
r13151 ~]# postconf -n
alias_database = hash:/etc/aliases , hash:/etc
On 24/4/2011 5:09 πμ, Evan Platt wrote:
Enforce a better password policy - our work password policy is minimum
My 2c:
Check your server logs to see if someone found some password(s) by
brute-force (you'll see multiple failed logins).
* If yes, enforce a strict password policy as sugges
* mallah.raj...@gmail.com :
> i am using policyd but it looks like it has no control once the initial
> connection is established , authenticated and pipelining is being used to
> pump spam . Is it really so?.
At least version 1 of policyd can throtte SASL authenticated senders. I don't
know about
"mallah.raj...@gmail.com" wrote:
>
>
>Coming back to real issue,i have already initiated password policy
>control. But i feel its not impossible for the enduser to somehow leak
>the password, passwords are commonly
>remembered by muas and possibility of virus and malware sniffing out
>the pass
Thanks bastian and everyone,
postfwd looks nice. i will heed the suggestions
most of suggestions asks to have better possword
policies basically.
Btw
i noticed that there was a typo
in the original posting , is it possible to correct the subject
line before it gets indexed ?
Sent from my Nokia
Sent from my Nokia phone
-Original Message-
From: Wietse Venema
Sent: 24/04/2011, 6:23 PM
To:
Subject: Re: need help for controlling authenticated realy
Rajesh Kumar Mallah:
[ Charset ISO-8859-1 unsupported, converting... ]
> Hi,
>
> We allow relaying of email via our server to our c
On Sun, Apr 24, 2011 at 07:15:34AM +0530, Rajesh Kumar Mallah wrote:
> We allow relaying of email via our server to our clients using authentication.
> The problem is that some miscreants have got hold of our clients password
> and are using our email server to send SPAM after successfully authenti
Rajesh Kumar Mallah:
[ Charset ISO-8859-1 unsupported, converting... ]
> Hi,
>
> We allow relaying of email via our server to our clients using authentication.
> The problem is that some miscreants have got hold of our clients password
> and are using our email server to send SPAM after successful
20 matches
Mail list logo